The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Securing Identities in the Cloud
Oct 03, 2023
Tips for A Streamlined Transition to Zero Trust
Oct 05, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Securing Identities in the Cloud
Oct 03, 2023
Tips for A Streamlined Transition to Zero Trust
Oct 05, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
DR Global
Middle East & Africa
Middle East & Africa
Black Hat news
Omdia Research
Events
Close
Back
Events
Events
Think Like An Attacker - A Dark Reading November 16 Event
Black Hat Middle East and Africa - Nov 14-16 - Learn More
Webinars
Securing Identities in the Cloud
Oct 03, 2023
Tips for A Streamlined Transition to Zero Trust
Oct 05, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Reports >
Webinars >
White Papers >
Slideshows >
Newsletters >
Events >
Partner Perspectives: Microsoft
Partner Perspectives: Google Cloud
Newsletter Sign-Up
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Think Like an Attacker: Understanding Cybercriminals & Nation-State Threat Actor | Nov 16 Virtual Event <REGISTER NOW>
Event
Tips for A Streamlined Transition to Zero Trust | Sept 28 LIVE Webinar <REGISTER NOW>
Event
The Evolution of the Vulnerability Landscape in 2023 | Sept 27 LIVE Webinar <REGISTER NOW>
Previous
Next
Security Monitoring
Breaking news, news analysis, and expert commentary about cybersecurity data analytics, including tools & technologies.
Proactive Security: What It Means for Enterprise Security Strategy
Proactive Security holds the elusive promise of helping enterprises finally get ahead of threats, but CISOs must come to grips with the technological and philosophical change that it brings.
September 26, 2023
Proactive Security holds the elusive promise of helping enterprises finally get ahead of threats, but CISOs must come to grips with the technological and philosophical change that it brings.
by Eric Parizo, Principal Analyst, Omdia
September 26, 2023
4 MIN READ
Article
Companies Explore Ways to Safeguard Data in the Age of LLMs
Generative AI models are forcing companies to become creative about how they keep employees from giving away sensitive data.
September 18, 2023
Generative AI models are forcing companies to become creative about how they keep employees from giving away sensitive data.
by Robert Lemos, Contributing Writer, Dark Reading
September 18, 2023
5 MIN READ
Article
Should Senior IT Professionals Be Accountable for Professional Decisions?
Everyone makes mistakes — but what if your mistakes risk the security of millions of people?
August 30, 2023
Everyone makes mistakes — but what if your mistakes risk the security of millions of people?
by James Watts, Managing Director, Databarracks
August 30, 2023
4 MIN READ
Article
Everest Group Research: C-Suite Must Recognize Critical Difference Between Cybersecurity and Cyber Resilience
August 29, 2023
August 29, 2023
3 MIN READ
Article
Vendors Training AI With Customer Data Is an Enterprise Risk
While Zoom has scrapped plans to harvest customer content for use in its AI and ML models, the incident should raise concerns for enterprises and consumers alike.
August 25, 2023
While Zoom has scrapped plans to harvest customer content for use in its AI and ML models, the incident should raise concerns for enterprises and consumers alike.
by Jai Vijayan, Contributing Writer, Dark Reading
August 25, 2023
4 MIN READ
Article
World Cup Glory Looms, and So Do Cyber Threats, Microsoft Warns
The attack surface of a live event like this summer’s World Cup in Australia and New Zealand rivals that of a large multinational enterprise, or even a small city.
August 03, 2023
The attack surface of a live event like this summer’s World Cup in Australia and New Zealand rivals that of a large multinational enterprise, or even a small city.
by Nate Nelson, Contributing Writer, Dark Reading
August 03, 2023
4 MIN READ
Article
Instagram Flags AI-Generated Content
Amid the national discussion about AI safety and non-human-originated content in the US, an app researcher spotted an effort by the social media app to flag AI posts for its 2+ billion users.
August 02, 2023
Amid the national discussion about AI safety and non-human-originated content in the US, an app researcher spotted an effort by the social media app to flag AI posts for its 2+ billion users.
by Dark Reading Staff, Dark Reading
August 02, 2023
2 MIN READ
Article
CISA: 'Submarine' Backdoor Torpedoes Barracuda Email Security
A China-nexus cyber-espionage campaign rages on with the fourth backdoor to surface in the wild that takes advantage of the CVE-2023-2868 zero-day security bug — with severe threat of lateral movement, CISA warns.
August 01, 2023
A China-nexus cyber-espionage campaign rages on with the fourth backdoor to surface in the wild that takes advantage of the CVE-2023-2868 zero-day security bug — with severe threat of lateral movement, CISA warns.
by Jai Vijayan, Contributing Writer, Dark Reading
August 01, 2023
3 MIN READ
Article
Microsoft 365 Breach Risk Widens to Millions of Azure AD Apps
China-linked APT actors could have single-hop access to the gamut of Microsoft cloud services and apps, including SharePoint, Teams, and OneDrive, among many others.
July 21, 2023
China-linked APT actors could have single-hop access to the gamut of Microsoft cloud services and apps, including SharePoint, Teams, and OneDrive, among many others.
by Tara Seals, Managing Editor, News, Dark Reading
July 21, 2023
4 MIN READ
Article
Microsoft 'Logging Tax' Hinders Incident Response, Experts Warn
A recent email compromise by Chinese APT group Storm-0558 highlights a lack of access to security logging by many Microsoft 365 license holders, prompting calls from researchers to abolish it.
July 17, 2023
A recent email compromise by Chinese APT group Storm-0558 highlights a lack of access to security logging by many Microsoft 365 license holders, prompting calls from researchers to abolish it.
by Becky Bracken, Editor, Dark Reading
July 17, 2023
3 MIN READ
Article
How to Put Generative AI to Work in Your Security Operations Center
Generative AI is the cybersecurity resource that never sleeps. Here are some of the ways security-focused generative AI can benefit different members of the SOC team.
July 12, 2023
Generative AI is the cybersecurity resource that never sleeps. Here are some of the ways security-focused generative AI can benefit different members of the SOC team.
by A.N. Ananth, Chief Strategy Officer, Netsurion
July 12, 2023
4 MIN READ
Article
Botnets Send Exploits Within Days to Weeks After Published PoC
Six months of honeypot data finds that 19% of traffic to sensors were malicious exploit attempts, and 95% of those attempts came from just three botnets.
July 06, 2023
Six months of honeypot data finds that 19% of traffic to sensors were malicious exploit attempts, and 95% of those attempts came from just three botnets.
by Robert Lemos, Contributing Writer, Dark Reading
July 06, 2023
4 MIN READ
Article
6 Ways Cybersecurity Is Gut-Checking the ChatGPT Frenzy
Generative AI chatbots like ChatGPT are the buzziest of the buzzy right now, but the cyber community is starting to mature when it comes to assessing where it should fit into our lives.
June 28, 2023
Generative AI chatbots like ChatGPT are the buzziest of the buzzy right now, but the cyber community is starting to mature when it comes to assessing where it should fit into our lives.
by Tara Seals, Managing Editor, News, Dark Reading
June 28, 2023
7 MIN READ
Slideshow
Most Enterprise SIEMs Blind to MITRE ATT&CK Tactics
Organizations are largely deluded about their own security postures, according to an analysis, with the average SIEM failing to detect a whopping 76% of attacker TTPs.
June 27, 2023
Organizations are largely deluded about their own security postures, according to an analysis, with the average SIEM failing to detect a whopping 76% of attacker TTPs.
by Elizabeth Montalbano, Contributor, Dark Reading
June 27, 2023
5 MIN READ
Article
Don't Overlook Twitter's Trove of Threat Intel for Enterprise Cybersecurity
Social media data can provide critical clues to help get ahead of the next cyberattack, experts say.
June 05, 2023
Social media data can provide critical clues to help get ahead of the next cyberattack, experts say.
by Becky Bracken, Editor, Dark Reading
June 05, 2023
3 MIN READ
Article